Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

eSecurity - Trusted Hosts

Bill Buchanan OBE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of trusted computing and secure boot processes in this 31-minute video lecture. Delve into topics such as TPM chips, endorsement keys, storage root keys, and the Coppersmith attack. Learn about Apple's T2 chip, disk encryption techniques, and the importance of entropy in security systems. Gain insights into BitLocker and methods for measuring entropy, enhancing your understanding of eSecurity and trusted host environments.

Syllabus

Intro
Boot state
TPM chip
Endorsement keys
Storage root keys
Coppersmith attack
T2 chip
Apple
Disk Encryption
eSecurity Encryption
eSecurity Performance
BitLocker
Entropy
Measuring entropy
Summary

Taught by

Bill Buchanan OBE

Reviews

Start your review of eSecurity - Trusted Hosts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.